r00t-3xp10it / redpill
Assist reverse tcp shells in post-exploration tasks
☆219Updated last year
Alternatives and similar repositories for redpill:
Users that are interested in redpill are comparing it to the libraries listed below
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆218Updated 3 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆226Updated 3 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆296Updated 3 years ago
- ☆324Updated last year
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆295Updated 3 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆455Updated 3 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆258Updated last year
- Bypass AMSI by patching AmsiScanBuffer☆264Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆378Updated 2 years ago
- A simple shell code encryptor/decryptor/executor to bypass anti virus.☆470Updated 3 years ago
- Various Cobalt Strike BOFs☆636Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆177Updated last month
- [POC] Asynchronous reverse shell using the HTTP protocol.☆267Updated 3 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆423Updated 2 years ago
- PowerShell scripts for communicating with a remote host.☆303Updated 2 years ago
- Manipulating and Abusing Windows Access Tokens.☆274Updated 4 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆359Updated 4 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆273Updated 3 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆310Updated 8 months ago
- A User Impersonation tool - via Token or Shellcode injection☆413Updated 2 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆764Updated last year
- Evading Anti-Virus with Unusual Technique☆214Updated 2 years ago
- Basic C2 Server☆190Updated 3 years ago
- PowerShell Script Obfuscator☆542Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆913Updated 10 months ago
- Windows active user credential phishing tool☆283Updated 5 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆456Updated 2 years ago
- Penetration testing utility and antivirus assessment tool.☆315Updated 2 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆208Updated 4 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆163Updated 3 years ago